Web Application Security Research
-
Bad bots make up a quarter of APAC's web traffic
Sponsored by: TechTarget ComputerWeekly.comBots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.
-
Toughening up web and mobile application security
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
Top 10 ASEAN IT stories of 2021
Sponsored by: TechTarget ComputerWeekly.comFrom adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
Driving Revenue and Increasing Value with Application Performance Management
Sponsored by: BlueCoatAs a leading provider of solutions for Service Providers, Blue Coat appliances give you the visibility, acceleration and security needed for optimizing your network. Read this e-book to learn how Blue Coat gives you the control you need to deliver a whole set of new managed services for your business and consumer customers.
-
Web Based Attacks
Sponsored by: Symantec CorporationThis report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Essential Guide to Threat Management
Sponsored by: Information Security MagazineCheck out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
-
Understanding Web Application Security Challenges
Sponsored by: IBMThis paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: IBMThis paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: LogicalisThis paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
NAV CANADA Takes Advantage of IBM Rational AppScan Software to Address the Security and Compliance of Its Online Applications
Sponsored by: LogicalisNAV CANADA helped enhance the security of its Web applications through best practices such as regular scanning and testing for vulnerabilities throughout the software development lifecycle.
-
Dell and Microsoft Windows Server 2008
Sponsored by: DellEMC and IntelĀ®Windows Server 2008 is designed to provide increased reliability and control over your server infrastructure.
-
Quicktour Demo: Key Differentiators between Microstrategy and Business Objects
Sponsored by: MicroStrategyThis tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Business Objects.
-
Move Web Application Security Testing into Your Development Cycle
Sponsored by: IBMThis paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
-
Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development.
Sponsored by: IBMThis paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
The IBM Rational AppScan Lifecycle Solution
Sponsored by: IBMIBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
-
Trial download: IBM Rational AppScan
Sponsored by: IBMDownload this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities.
-
WebSphere Application Server Feature Pack for Web 2.0
Sponsored by: IBMThis white paper explores methods for improving the development of Ajax-based applications and Web 2.0 to SOA connectivity.
-
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Sponsored by: ImpervaICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
-
Cyber Attacks on the Rise: IBM 2007 Report
Sponsored by: IBMThis white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
-
Introduction to crystalreports.com
Sponsored by: Business ObjectsSharing reports over the Web is convenient and efficient, yet if it is not done securely, the information can be easily compromised. Attend this Webcast to learn how your business can instantly and securely deliver reports to improve productivity and ...
-
Oracle Application Express Tutorial
Sponsored by: Oracle CorporationFollow this step-by-step tutorial to create secure web applications that run inside your database using Oracle Application Express. You'll quickly learn how to easily build secure web forms, reports and charts.